General

  • Target

    2c9804c0c7bb1ecb07b8e17369c57526bcd4df256402870b9747649ec9f46067

  • Size

    277KB

  • Sample

    241110-h9y2pasdlj

  • MD5

    65e678fac9038d825e2749f0da3598e3

  • SHA1

    0882fa97ec0f4ca4857ccb957b966dfe9e1795ae

  • SHA256

    2c9804c0c7bb1ecb07b8e17369c57526bcd4df256402870b9747649ec9f46067

  • SHA512

    f5a7a7820f75e452b742e5bbb375e667c0e9b4d761308c3c07dfb4e03920bad6e3b8ed4f6beafacc0dbe35b89459c94f3a818134a6a870af50aa703b454d8f29

  • SSDEEP

    6144:1L9LNkIt2JN2VpO2cPn3LMY1AIjX6kdL:z5lt2z2VA2cwUdqk

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      2c9804c0c7bb1ecb07b8e17369c57526bcd4df256402870b9747649ec9f46067

    • Size

      277KB

    • MD5

      65e678fac9038d825e2749f0da3598e3

    • SHA1

      0882fa97ec0f4ca4857ccb957b966dfe9e1795ae

    • SHA256

      2c9804c0c7bb1ecb07b8e17369c57526bcd4df256402870b9747649ec9f46067

    • SHA512

      f5a7a7820f75e452b742e5bbb375e667c0e9b4d761308c3c07dfb4e03920bad6e3b8ed4f6beafacc0dbe35b89459c94f3a818134a6a870af50aa703b454d8f29

    • SSDEEP

      6144:1L9LNkIt2JN2VpO2cPn3LMY1AIjX6kdL:z5lt2z2VA2cwUdqk

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.